Private Information Retrieval in the Presence of Malicious Failures

نویسندگان

  • Erica Y. Yang
  • Jie Xu
  • Keith H. Bennett
چکیده

In the application domain of online information services such as online census information, health records and real-time stock quotes, there are at least two fundamental challenges: the protection of users’ privacy and the assurance of service availability. We present a fault-tolerant scheme for private information retrieval (FT-PIR) that protects users’ privacy and ensures service provision in the presence of malicious server failures. An error detection algorithm is introduced into this scheme to detect the corrupted results from servers. The analytical and experimental results show that the FT-PIR scheme can tolerate malicious server failures effectively and prevent any information of users from being leaked to attackers. This new scheme does not rely on any unproven cryptographic premise and the availability of tamperproof hardware. An implementation of the FT-PIR scheme on a distributed database system suggests just a modest level of performance overhead.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Software Services and Software Maintenance

Software services are being promoted as the next big step forward in software engineering.. Inevitably, both service vendor and service client programs will require maintenance. We present a service architecture that has been motivated by a long term vision for software as something which is used, not owned. This architecture is used to show how evolution of software can be achieved. It uses th...

متن کامل

Optimally Robust Private Information Retrieval

We give a protocol for multi-server information-theoretic private information retrieval which achieves the theoretical limit for Byzantine robustness. That is, the protocol can allow a client to successfully complete queries and identify server misbehavior in the presence of the maximum possible number of malicious servers. We have implemented our scheme and it is extremely fast in practice: up...

متن کامل

Sharing with Limited Trust: An Attack Tolerance Service in Durham e-Demand Project

The unique characteristics of the Grid pose significant new security challenges that demand for new solutions. This paper argues that only limited trust should be placed in the grid environment. The trust relationship among grid nodes may be valid only within the lifetime of a submitted job. We focus on two key security challenges centred on the trust issue: protecting the intention (privacy) o...

متن کامل

On the Possibility of Basing Oblivious Transfer on Weakened Private Information Retrieval

We consider the problem of reducing Oblivious Transfer to Private Information Retrieval. We give a simple reduction from 1-out-of-2 Oblivious Transfer to Private Information Retrieval, where the reduction is against malicious players. We also consider the completeness of Private Information Retrieval on weakened assumption. We will give a impossibility result and a possibility result. For impos...

متن کامل

A Fault-Tolerant Approach to Secure Information Retrieval

For any critical information services, there are two fundamental challenges: the protection of users’ privacy and the provision of highly available services. Several schemes for private information retrieval (PIR) were proposed to protect users’ privacy when sensitive information stored in (remote) database servers is accessed. However, all the existing PIR schemes are based on a simple honest-...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002